A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
☆15Apr 3, 2019Updated 7 years ago
Alternatives and similar repositories for the-book-of-secret-knowledge
Users that are interested in the-book-of-secret-knowledge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Oct 10, 2018Updated 7 years ago
- ☆12Jun 25, 2021Updated 4 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Apr 1, 2026Updated 3 weeks ago
- pfSense Configuration Auditing Script☆13Dec 14, 2020Updated 5 years ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆23Jun 22, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- python for grin☆11Feb 28, 2026Updated 2 months ago
- Cryptographic Time-delay Engine☆10Mar 24, 2014Updated 12 years ago
- Check whether a Grin Wallet is Reachable or not☆10Apr 9, 2021Updated 5 years ago
- Linux integrity monitoring for CentOS/RHEL☆13May 13, 2020Updated 5 years ago
- A logging handler for Splunk. Lets you send information to Splunk directly from your Python code.☆23Jul 28, 2015Updated 10 years ago
- A git server implementation using isomorphic-git (WIP)☆15Dec 7, 2019Updated 6 years ago
- A generic skeleton project for quickly getting a new cisagov project started.☆18Apr 22, 2026Updated last week
- Toolkit for Machine Learning & Analytics Use Cases.☆13Aug 30, 2018Updated 7 years ago
- scripts and configs from .conf2016 talk on Hunting the Known Unknowns PowerShell Edition☆15Oct 25, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Break rotational letter substitution (ROT) encoded text, right from your terminal.☆14Jan 5, 2023Updated 3 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- ☆12Sep 25, 2020Updated 5 years ago
- Organizational system for a library☆11Apr 11, 2026Updated 2 weeks ago
- Book Hands on Machine Learning with Scikit-Learn and Tensorflow from O'reilly - Geron☆10May 11, 2017Updated 8 years ago
- ☆10Jul 24, 2020Updated 5 years ago
- Encourage and introduce your co-workers to a widespread knowledge-based sharing of posts, videos, or topics with a bite-sized information…☆15Jul 18, 2023Updated 2 years ago
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 9 years ago
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆14Nov 26, 2025Updated 5 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Splunk technical add-on (TA) for ingesting BigFix client, relay, and server logs. Includes REST inputs for ingesting assets, relevant fix…☆17Mar 11, 2025Updated last year
- Legacy Badge.team firmware for HackerHotel 2019☆13Aug 7, 2019Updated 6 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- DC540 hacking challenge 0x00004 [C CTF].☆11Nov 26, 2025Updated 5 months ago
- Enables front line workers to inspect an asset or area to manage quality of products and services or maintain safety at workplace☆17Mar 22, 2023Updated 3 years ago
- Trying to install Linux on x86 tablet Samsung Galaxy Book 10.8"☆11Apr 30, 2022Updated 3 years ago
- ☆15Jul 31, 2018Updated 7 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆22Apr 1, 2026Updated 3 weeks ago
- ☆14Sep 19, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Series of scripts to generate fake logs for use in cyber exercises.☆18Oct 25, 2015Updated 10 years ago
- eve ng fork from https://gitlab.com/eve-ng-dev/eve-ng-nokia☆19Mar 12, 2019Updated 7 years ago
- PowerShell commands for managing Windows Admin Center☆18Jun 5, 2019Updated 6 years ago
- A tool for using the Eve-NG restAPI via the command line.☆17May 25, 2020Updated 5 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Mar 29, 2016Updated 10 years ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- Notes on offensive training☆16Nov 29, 2017Updated 8 years ago